Inside the Internet of Things - Bryon Moyer Blog
[From the last episode: We looked at authorization – the permissions that different people or things have to see things on the network.] Let’s say that your IoT device sends a message to a server. Let’s say it’s a refrigerator, and it’s sending the message that you’re out of milk. […]
Read More[From the last episode: We looked at the various kinds of keys and how they can interact for authentication and data encryption.] So far, we’ve focused on the first of three A-words: authentication. The whole point of authentication is to make sure that someone getting onto the network is who […]
Read More[From the last episode: We looked at an example of how authentication ensures that, when you establish a secure web connection, everyone is who they say they are.] Let’s talk some more about keys. And I’ll warn you: as hard as I’m going to try to make things clear, you […]
Read More[From the last episode: We looked at different kinds of keys used for encryption.] Let’s say you want to connect to a website. Yeah, I know, we’re supposed to be talking about the IoT, but using a web browser is more familiar and it uses the same concepts. So we’ll […]
Read More[From the last episode: We looked at the notion of expressing text as a number and then multiplying by a key to encrypt it.] Last time we looked at a very primitive way of encrypting some text: by multiplying by a key. Some challenges with this approach immediately come to […]
Read More